Bug 142748
| Summary: | CAN-2004-1137 IGMP flaws | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 3 | Reporter: | Mark J. Cox <mjc> |
| Component: | kernel | Assignee: | David Miller <davem> |
| Status: | CLOSED ERRATA | QA Contact: | Brian Brock <bbrock> |
| Severity: | high | Docs Contact: | |
| Priority: | medium | ||
| Version: | 3.0 | CC: | bressers, jparadis, peterm, petrides, riel |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | impact=important,embargo=20041214 | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2004-12-23 20:48:01 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Mark J. Cox
2004-12-13 20:16:18 UTC
Removing embargo This issue does have the potential to be remotely exploitable. From the advisory (3) The igmp_marksources() function from the network module is called in the context of an IGMP group query received from the network and suffers from an out of bound read access to kernel memory. It happens because the received IGMP message's parameters are not validated properly. This flaw is remotely exploitable on Linux machines with multicasting support if and only if an application has bound a multicast socket. This is not a terribly common situation, so it won't alter the severity of the issue. This issue doesn't affect RHEL2.1. A fix for this problem has just been committed to the RHEL3 E5 patch pool this evening (in kernel version 2.4.21-27.0.1.EL). A fix for this problem has also been committed to the RHEL3 U5 patch pool this evening (in kernel version 2.4.21-27.4.EL). An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2004-689.html |